Pulling Docker images from private registries like Cloudsmith presents a security challenge due to authentication management, network access, and trust across distributed systems. To address this, OpenID Connect (OIDC) can be used when pulling Docker images into Kubernetes, providing a layer of OAuth 2.0 that identifies who is making the request and verifying that requests come from a trusted source. This enhances security and simplifies credential management by using short-lived access tokens instead of long-lived credentials. An OIDC-based solution involves creating an Image Pull Secret with a Cloudsmith token obtained through OIDC, which can be automated using a Kubernetes CronJob to run at regular intervals and perform tasks such as retrieving the Kubernetes service account token, exchanging it for a Cloudsmith token via OIDC, and creating or updating an Image Pull Secret. This approach offers benefits including automatic rotation, simplified management, and alignment with security best practices.