SAML Public Authentication Certificate for Signed Authn Requests (Updated 11/4/25)
November 4th, 2025 Update: We have updated this article with the new Quickbase SAML Zip File. Below in this article, you will find both the current Zip File which will expire on November 25th, 2025 and the new Zip File which will expire on October 30th, 2026. June 21st, 2024 Update: We have created a Quickbase app to host the Quickbase SAML Zip File. Access the app by clicking the link above to download the file. For Quickbase Realm and Account Administrators As a Quickbase Realm or Account Administrator, you are probably aware of how your users authenticate (login) to the Quickbase platform. Many Quickbase customers use our SAML authentication feature. Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services, such as Quickbase, that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications. To help you understand what you may be using at your company, some examples of SAML, SSO or IdP (Identity Provider) vendors are Okta, OneLogin, Microsoft, Duo, and there are many others. Some customers using the SAML authentication feature may also choose to use an extra layer of security whereby each authentication request from the Quickbase platform to your company’s SSO directory (or IdP) is signed by Quickbase using a public authentication certificate configured on the Quickbase platform. Quickbase refers to this extra security feature as the “SAML Authn Requests” option. It has that name because there is a feature in the Quickbase SAML configuration settings named “SAML Authn Requests”. Only Quickbase staff can see this option or change it. It is only enabled when a customer informs Quickbase of the customer's intention to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If a customer wants to know if they are using the “Signed Authn Requests” option, or would like the option enabled or disabled, they can open a support case with Quickbase Technical Support. *When the “SAML Authn Requests” feature is enabled by Quickbase, and the customer has configured their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process, both Quickbase and the customer’s IdP must use the same public authentication certificate in order for Quickbase authentication to work successfully. If they do not match, Quickbase authentication (logins) will fail and the customer will be unable to use Quickbase. Once a year, Quickbase is required to rotate the public authentication certificate. The certificate rotation will occur on a specific date/time within a 15 minute maintenance window. Therefore, the certificate rotation process requires careful coordination between Quickbase and all customers who have chosen to use the “SAML Authn Requests” feature. Typically, about 2 weeks prior to the annual rotation, Quickbase will communicate to Realm and Account Administrators for customers using the “SAML Authn Requests” feature via in-product messaging and possibly also e-mail. We also post a notice on the Quickbase service page. We provide a link to this Community post which specifies in a section below the date and time of the rotation and provides a link to download the new public authentication certificate. *The Realm and Account Administrators need to contact the person or team at their company responsible for administering their IdP/SSO/SAML system, typically their IT department, in order to ensure that the new public authentication certificate from Quickbase is also installed in the customer’s IdP/SSO/SAML system during the 15 minute maintenance window announced by Quickbase. *The public authentication certificate CANNOT be changed in your company’s IdP prior to the announced maintenance window or logins to the Quickbase platform will break. If the certificate is not changed in your company’s IdP during the 15 minute maintenance window announced by Quickbase, logins to the Quickbase platform will be broken until the certificate is updated in the IdP. For Single Sign-On (SSO) or Identity Provider (IdP) Administrators: PLEASE NOTE: The remainder of this Quickbase Community post is highly technical and should be reviewed by the person or team responsible for administering the Single Sign-On (SSO) or identify provider (IdP) system used to control access to the Quickbase platform. Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials (username and password). An identity provider (IdP) system is a directory of usernames, passwords, groups, roles, etc. that is typically used to manage access to the applications used by a company. Another acronym commonly associated with Single Sign-On is SAML. Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications. Many customers use Quickbase's SAML authentication feature. A subset of customers may have the “Signed Authn Requests” option selected in their Quickbase SAML configuration. That option is a security enhancement that results in Quickbase signing the authentication requests made to the customer’s identify provider (IdP). Use of this option also requires the customer to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. *Customers who choose to use the “Signed Authn Requests” option and enable signing of authentication requests on their IdP must be prepared to manage the annual public authentication certificate update process described below. The option itself offers only marginal security benefit so customers should decide for themselves if that marginal security benefit is worth the effort required to coordinate and execute the update of the certificate and potentially incur several minutes or more of down time for their use of the Quickbase platform while the public authentication certificate on their IdP may not match the certificate used on the Quickbase platform. The “Signed Authn Requests” option is only visible to Quickbase staff and can only be changed by Quickbase staff. It should only be enabled when a customer informs Quickbase of the customer's intention to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If a customer wants to know if they are using the “Signed Authn Requests” option, or would like the option enabled or disabled, they can open a support case with Quickbase Technical Support. In order to validate that the signed authentication requests actually come from Quickbase, we provide the customer with a public authentication certificate. Customers using the “Signed Authn Requests” option must ensure their IdP is configured with the public authentication certificate currently being used by the Quickbase platform to sign authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If the public authentication certificate configured in the customer’s IdP does not match the public authentication certificate being used by Quickbase, the customer will not be able to authenticate successfully to the Quickbase platform. *Quickbase has no ability to know if or how a customer has configured their IdP. We therefore cannot tell a customer if their IdP is requiring Quickbase to sign authentication requests and we cannot tell a customer if the public authentication certificate Quickbase is using matches the certificate the customer has configured in their IdP. Quickbase rotates the public authentication certificate every year and distributes it to applicable customers inside a certificate file via this Quickbase Community post. Quickbase determines the applicable customers based on which have the “Signed Authn Requests” option enabled in their Quickbase SAML configuration. During the period of time starting on the date that we announce our intention to update the certificate, and ending after the date/time we actually update the certificate on the Quickbase platform, we make both the current and new certificates available in this Community post. After we update the certificate on the Quickbase platform, we then remove the now out-of-date certificate from this Community post. Prior to the annual public authentication certificate rotation period, Quickbase will communicate via in-product messaging and possibly also e-mail to Quickbase realm and account administrators at the applicable customers the specific date/time on which we intend to update the certificate on the Quickbase platform. When Quickbase updates the certificate, we do so during a 15 minute maintenance period on the announced date/time. We strive to provide customers with enough notice of this maintenance period for them to notify their responsible staff, typically their IT department or whichever group within the customer’s organization is responsible for administering their identify provider (IdP) system. The customer’s IdP administrator should plan to update the public authentication certificate provided by Quickbase during the 15 minute maintenance period announced by Quickbase. Doing so will minimize the chance of the customer experiencing any interruption of their use of the Quickbase platform. PLEASE NOTE: For any customer using the “Signed Authn Requests” option, i.e., requiring signing of authentication requests made by the Quickbase platform to the customer's IdP, any time the public authentication certificate used by Quickbase does not match the public authentication certificate configured in the customer's IdP, logins to the Quickbase platform will fail. It is therefore essential that the customer update the public authentication certificate in their IdP during the 15 minute maintenance period announced by Quickbase annually. Quickbase Public Authentication Certificate Rotation Maintenance Window Quickbase plans to update the public authentication certificate on Wednesday, November 20, 2024, between 8:00 PM and 8:15 PM Eastern US Time. Current and New Public Authentication Certificates The NEW public authentication certificate is provided below for you to download and install on your identify provider during the 15 minute maintenance period. The zip file contains both the metadata (with certificate contained inside) as well as the certificate on its own. New Certificate (Expires October 30th, 2026): QB_SAML_Exp10-30-2026.zip Current Certificate: (Expires November 25, 2025): QB_SAML_Exp11-25-2025.zip Additional Information on SAML Public Authentication Certificate Configuration Scenarios and Expected Outcomes This section describes several scenarios that could exist specific to a Quickbase customer using SAML authentication for access to the Quickbase platform. Quickbase SAML configuration option “Signed Authn Requests” is disabled, and Customer does not configure their IdP to require signing of SAML authentication requests. In this case, logins to the Quickbase platform will work normally assuming there are no other SAML configuration issues. There is no use of public certificates in this scenario. Quickbase SAML configuration option “Signed Authn Requests” is disabled, and Customer configures their IdP to require signing of SAML authentication requests, and has the currently applicable public authentication certificate from Quickbase installed in their IdP. In this case, logins to the Quickbase platform will fail because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed and Quickbase is not signing them because the “Signed Authn Requests” option is disabled. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer configures their IdP to require signing of SAML authentication requests, and has the currently applicable public authentication certificate from Quickbase installed in their IdP. In this case, logins to the Quickbase platform will work normally because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed using the currently applicable public authentication certificate and Quickbase is signing them with that same public authentication certificate. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer configures their IdP to require signing of SAML authentication requests, and has a public authentication certificate installed in their IdP that is either expired, or does not match the public authentication certificate currently being used by Quickbase. In this case, logins to the Quickbase platform will fail because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed using the public authentication certificate they have configured in their IdP and Quickbase is signing them with a different public authentication certificate. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer does not configure their IdP to require signing of SAML authentication requests. In this case, logins to the Quickbase platform may or may not work normally depending on the IdP and how it handles a signed request. Quickbase cannot anticipate how different IdPs may handle this scenario. The solution is to open a case with Quickbase Technical Support and request that the “Signed Authn Requests” option be disabled.2.2KViews2likes0CommentsQuickbase Related Web Sites Impacted by Microsoft Azure Outage
Due to a major Microsoft Azure outage that began around 11:45 AM Eastern US Time, specific Quickbase related web sites are down. This issue is not impacting the Quickbase platform. The following web sites are unavailable or have degraded performance: Fastfield - Please see the Fastfield Status Page for updates - https://fastfield.status.io/ Quickbase University Quickbase Service Page We will post updates here in Quickbase Community as we learn more from Microsoft and the partner vendors we use for Quickbase University and Quickbase Service Page. Subscribe to this post to get email updates. Update 3:48pm As of 3:35 PM Eastern US Time, we are starting to see slow recovery of our impacted web sites. Some customers are able to intermittently access Fastfield, Quickbase University, and Quickbase Service Page. Microsoft reports that full recovery could take as much as 4 more hours. We are continuing to monitor the sites and will update this post as we see significant change. 5:01 pm Update As of 4:55 PM Eastern US Time, we continue to see steady recovery of our impacted web sites. Fastfield access has become increasingly more consistent. The vendor that hosts Quickbase University just marked the incident as resolved for them within the past 10 minutes and our monitoring is showing University as available again. The vendor that hosts the Quickbase Service Page marked the incident as resolved for them an hour ago, but we continued to see failures until very recently. We are continuing to monitor the sites and will update this post as we see significant change. 8:45 PM Update As of 8:20 PM Eastern US Time, our web sites impacted by the Microsoft Azure outage are running normally and have been for a couple hours. Microsoft has noted on their status page that they do not expect to fully resolve the issue until 8:40 PM Eastern US Time (about 20 minutes from now) but we feel safe in stating this issue is resolved for us. There will be no further updates.135Views1like0CommentsDocument Template Spacing
Hello, I am looking for any advice/help on QuickBase's Document Template issues I have been experiencing. I have a word template that I have uploaded that is a single page, however it keeps spanning multiple pages when I uploaded. Has anyone been able to adjust the spacing in Document Templates? I can't find any way to do it, it seems to default to a double space and I want single spaces. Has anyone been able to find a way to keep their documents templates to just a single page easily? Thanks16Views0likes0CommentsSecure Links & File Attachments
I have an EOTI user and role. They can only access records where the key = valid. This much works as expected. The problem is on records they can access, if they click a file attachment (just a field on the same record), it returns a Quickbase not found error page. Doesn't let them access the attachment. In the Quickbase docs it says: "You can use the EOTI group to provide access to file attachments at a more granular level than what Quickbase offers, that is, using Quickbase without custom code or API access from a separate environment." So it seems like it should work. What am I missing?Solved106Views0likes4CommentsSuggestions for archiving or closing records
In my current application I am building for the purpose of tracking Assets, their monthly rental rates, rental charges for each/month, and monthly invoices for each client. Currently the application has about 10 years' worth of data and this is making some of the reports, forms have long load times as there are at least 3 dozen or so calculations being done across all the tables and forms. My thought was when a month, quarter, year is closed then specific data would be "captured" and moved to another table. The "Archived" table would just hold the results of any calculations previously done, essentially creating a snapshot of that record into another table. The Archived table could then be used for other reports but wouldn't be bogged down with having to do the original calculations, their results would just be summarized. Once this data was captured, the original record would either somehow be closed for editing or get an archived indicator, so they could be excluded from the current month/quarter/years' entries. Just seeking the best way to optimize the application as the amount of data will only continue to grow and thus the lag time greater when accessing the system.85Views0likes3CommentsTransferring Field Data to Another Record
Hello, Is it possible for me to transfer quantity data on one record to another record? As an example, Record A has 10 laptops. Record B has 5 laptops. I would like to transfer 2 laptops from Record A to Record B. I've tried different methods, but I keep hitting a wall.95Views0likes3CommentsXLSX import to 2 Linked Tables?
Is there an easy way to accomplish this? Say as an example: Table1 - LEAD_NAME, PHONE, CONTACT_NAME Table2 - LEAD_NAME, CALL_DATE, NOTES Table1 can link to many Table2 If I create an xlsx sheet with all the relevant fields, can I do a mass import of leads and or calls (together) with a single upload? Or two uploads might make more sense so it doesn't duplicate leads? LEAD1, 555-555-5555, Bob, 09/17/2025,"Good Call" LEAD1, 555-555-5555, Bob, 09/17/2025,"Bad Call" I am curious how the linking would work here. I assume a pipeline might be needed? but before going down that path I wanted to see if I am overlooking an easier way.59Views0likes1CommentError in Quickbase Docs: Gantt Plugin
Not sure where to submit this, but I noticed an error in the Quickbase docs for the Gantt plugin. At the bottom of this page it says: "Note: If you don't create the tables, the plugin creates them for you." Which is wrong and contradicts another page on the same topic: "Note: The Gantt plugin does not create tables."Solved85Views0likes2CommentsCustom Role Permissions Question
Hello, I was wondering is there a way in QuickBase to customize a role's permissions based on a specific user. For example, I have a role titled "Provider User". There are many users who are assigned to this role, but there is only one user (i.e., John Doe) who has this role but needs access to create new reports and such. Is it possible to customize a role settings based on specific users? Please let me know. Thanks in advance!Solved202Views0likes6Comments