phpMyAdmin Blowfish Secret Generator

Enter the randomly generated set of characters below into your phpMyAdmin file for the $cfg[‘blowfish_secret’] variable. You can technically use any phrase you like for the blowfish_secret variable however the below makes it easy so you don’t have to think of one. Every time you refresh this page a new $cfg[‘blowfish_secret’] will be randomly generated.

$cfg[‘blowfish_secret’]: Article relating to a blowfish_secret variable not entered error and some other phpMyAdmin configuration options.

The documentation states that any combination of characters up to 46 total can be used for the blowfish_secret variable which is used for cookie authentication. The characters below are generated on the fly using lowercase letters, uppercase letters, numbers, and symbols. Each combination is never logged in any way so you can rest assured that your combination of characters is unique and will not be used by anyone else. Just copy the characters at the bottom of the page and enter them into the file located in the phpMyAdmin home directory on your server which by default on CentOS is /usr/share/phpmyadmin.

Example phpMyAdmin Blowfish Secret Variable Entry:


  1. /*
  2.  * This is needed for cookie based authentication to encrypt password in
  3.  * cookie
  4.  */
  5. $cfg['blowfish_secret'] = '{^QP+-(3mlHy+Gd~FE3mN{gIATs^1lX+T=KVYv{ubK*U0V'; /* YOU MUST FILL IN THIS FOR COOKIE AUTH! */

Copy The Output Below To Use For Your phpMyAdmin $cfg[‘blowfish_secret’]:


If you would like a different character combination than the one above click the refresh button in your browser to generate a new set of characters.

Are there other online tools you would like to see the Question Defense team develop? Let us know about them here.

Have questions not answered by the article or this tool then click here to Engage with other technical people.