Leveraging a persistent connection to provide a client access to a secured
service may include establishing a persistent connection with a client in
response to a first request from the client, and brokering a connection
between the client and a secured service based on a second request from
the client by leveraging the persistent connection with the client. The
brokering may occur before the client attempts to connect to the secured
service directly and the connection may be established between the client
and the secured service without provision by the client of authentication
information duplicative or additional to authentication information
provided by the client to establish the persistent connection.