Systems and methods for tiered connection pooling are disclosed herein. An example system may include a memory encoded with computer executable instructions that when executed cause a processing unit to receive a request to access a resource; determine whether a used authenticated connection is available; if the used authenticated connection is available, fulfill the request using the used authenticated connection; if the used authenticated connection is not available, determine whether a first unused authenticated connection is available; if the first unused authenticated connection is available, fulfill the request use the first unused authenticated connection; if the first unused authenticated connection is not available, determine whether a first unauthenticated connection is available; if the first unauthenticated connection is not available, establish a second unauthenticated connection with the resource; authenticate the second unauthenticated connection to provide a second unused authenticated connect