Security can be examined at various levels:
Suppose an unauthorized person is trying to execute our copy of phpMyAdmin. If we use the simple
config authentication type, anyone knowing the URL of our phpMyAdmin will have the same effective rights to our data as we do. In this case, we should use the directory protection mechanism offered by our web server (for example,
.htaccess, a file name with a leading dot) to add a level of protection.
If we decide on using