Methods, systems, computer program products and data structures are
described which allow a client to communicate with a server even though
multiple proxies that require different authentication data must be
traversed to allow such communication. In operation, the client first
authenticates to a first proxy using authentication data appropriate for
the first proxy. The client then authenticates to a second proxy using
different authentication data that is appropriate for the second proxy.
This proxy authentication continues through as many proxies as necessary
until the client is in communication with the server.