Resource Icons
Latest Highlights
Check Out The Latest in The Qrew
1 MIN READ
Hi Qrew,
While there are no Qrew Meetups this week, this is an important week for the Qrew, as we'll be opening up registration for Empower26! Be on the look out for more details for Call...
Maria
Community Manager
1 MIN READ
If a quick summary is what you need, in under 3 minutes I will walk you through the most recent updates to Quickbase, right here:
Highlights include:
New getRo...
RobHenderson
Quickbase Staff
3 MIN READ
When you talk to Mark, you can sense two things immediately:
he’s been using Quickbase for a very long time
and he’s still having a blast.
As the founder and Principal Engineer of Your Qui...
Maria
Community Manager
The Content Feed
Feed
Unorthodox post - when your brain just won't "Quickbase"
Hey all! This is going to be a vulnerable post and I deliberated whether I'd post, but this has always been an incredibly supportive community. I am going through a challenging time in life having lost my mom a couple of months ago, and one of the most surprising ways this has affected me is -- my brain is just "off" for Quickbase. I'd been asked to head up a project cleaning up a former app developer's less-than-ideal-state work, which is something I very much would like to do; but I'm literally logging in daily and looking at my screen, with Quickbase being a small percentage of what I'm generally responsible for day-over-day, and I am just unable to get started. Has anyone experienced this? Any tips for snapping yourself back into shape? As a musician outside of work as well, I realize Quickbase is very much also a creative space, and when I think about whether you could just command yourself to write a song on demand, it feels like a similar mental lock-out where you don't have a lot of control over when your creative energy is going to come back. Would love any feedback and apologies for the sort of odd post. I've been sitting with this project for about 6 weeks now and it's going exactly no where. I either need to take a full pause from the project, or figure out how to get my head in this game.3likes8CommentsAutopopulate Form Fields
Hello, I was wondering when a user enters demographic info (i.e., First Name, Last Name, Date of Birth, etc.) on a form, is there a way to autocomplete / autopopulate a user's info? For context, this is a concern because we have staff members who often enters multiple entries for the same clients/members on QuickBase and they frequently have to reenter the same demographic info. Can non-users info be saved or accessed in an easier way? Please let me know if I need to elaborate. Thanks in advance!Solved0likes1CommentDenying ticket does not move it to "Denied" stage in pipeline.
I created a Kanban board as my pipeline for new ticket request that come in when requestors need help with something. They rest of the automation works well, however for some reason I when opening a ticket and denying it, it does not move to the "Denied" stage in the pipeline, but rather it stays in the "Requests Received" stage. I would appreciate assistance resolving this. Thank you.0likes2CommentsWant the Approve/Deny buttons to disappear once ticket is approved.
I built a ticketing system for our department so we can receive requests from employees for assistance they may need. Once my manager reviews the ticket and approves and assigns it to a team member for them to work on it, I want the Approve/Deny buttons to disappear on the Internal Ticket Review Form's "Edit" view we see when we click on the ticket to open it once the ticket has been approved. I also don’t want the Approve/Deny instructional text to show after that either. How can I do this? Thank you.0likes1CommentCreating a 'foreach' style loop in pipelines
Is there a way to do create a loop in Pipelines that runs a set number of times? For example, I want to run it x times based on user input: When a record is updated, it will make X copies of it based on a "clone quantity" field in the updated record. Thanks! ------------------------------ Matt Makris ------------------------------1like8CommentsSAML Public Authentication Certificate for Signed Authn Requests (Updated 11/4/25)
November 4th, 2025 Update: We have updated this article with the new Quickbase SAML Zip File. Below in this article, you will find both the current Zip File which will expire on November 25th, 2025 and the new Zip File which will expire on October 30th, 2026. June 21st, 2024 Update: We have created a Quickbase app to host the Quickbase SAML Zip File. Access the app by clicking the link above to download the file. For Quickbase Realm and Account Administrators As a Quickbase Realm or Account Administrator, you are probably aware of how your users authenticate (login) to the Quickbase platform. Many Quickbase customers use our SAML authentication feature. Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services, such as Quickbase, that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications. To help you understand what you may be using at your company, some examples of SAML, SSO or IdP (Identity Provider) vendors are Okta, OneLogin, Microsoft, Duo, and there are many others. Some customers using the SAML authentication feature may also choose to use an extra layer of security whereby each authentication request from the Quickbase platform to your company’s SSO directory (or IdP) is signed by Quickbase using a public authentication certificate configured on the Quickbase platform. Quickbase refers to this extra security feature as the “SAML Authn Requests” option. It has that name because there is a feature in the Quickbase SAML configuration settings named “SAML Authn Requests”. Only Quickbase staff can see this option or change it. It is only enabled when a customer informs Quickbase of the customer's intention to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If a customer wants to know if they are using the “Signed Authn Requests” option, or would like the option enabled or disabled, they can open a support case with Quickbase Technical Support. *When the “SAML Authn Requests” feature is enabled by Quickbase, and the customer has configured their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process, both Quickbase and the customer’s IdP must use the same public authentication certificate in order for Quickbase authentication to work successfully. If they do not match, Quickbase authentication (logins) will fail and the customer will be unable to use Quickbase. Once a year, Quickbase is required to rotate the public authentication certificate. The certificate rotation will occur on a specific date/time within a 15 minute maintenance window. Therefore, the certificate rotation process requires careful coordination between Quickbase and all customers who have chosen to use the “SAML Authn Requests” feature. Typically, about 2 weeks prior to the annual rotation, Quickbase will communicate to Realm and Account Administrators for customers using the “SAML Authn Requests” feature via in-product messaging and possibly also e-mail. We also post a notice on the Quickbase service page. We provide a link to this Community post which specifies in a section below the date and time of the rotation and provides a link to download the new public authentication certificate. *The Realm and Account Administrators need to contact the person or team at their company responsible for administering their IdP/SSO/SAML system, typically their IT department, in order to ensure that the new public authentication certificate from Quickbase is also installed in the customer’s IdP/SSO/SAML system during the 15 minute maintenance window announced by Quickbase. *The public authentication certificate CANNOT be changed in your company’s IdP prior to the announced maintenance window or logins to the Quickbase platform will break. If the certificate is not changed in your company’s IdP during the 15 minute maintenance window announced by Quickbase, logins to the Quickbase platform will be broken until the certificate is updated in the IdP. For Single Sign-On (SSO) or Identity Provider (IdP) Administrators: PLEASE NOTE: The remainder of this Quickbase Community post is highly technical and should be reviewed by the person or team responsible for administering the Single Sign-On (SSO) or identify provider (IdP) system used to control access to the Quickbase platform. Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials (username and password). An identity provider (IdP) system is a directory of usernames, passwords, groups, roles, etc. that is typically used to manage access to the applications used by a company. Another acronym commonly associated with Single Sign-On is SAML. Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications. Many customers use Quickbase's SAML authentication feature. A subset of customers may have the “Signed Authn Requests” option selected in their Quickbase SAML configuration. That option is a security enhancement that results in Quickbase signing the authentication requests made to the customer’s identify provider (IdP). Use of this option also requires the customer to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. *Customers who choose to use the “Signed Authn Requests” option and enable signing of authentication requests on their IdP must be prepared to manage the annual public authentication certificate update process described below. The option itself offers only marginal security benefit so customers should decide for themselves if that marginal security benefit is worth the effort required to coordinate and execute the update of the certificate and potentially incur several minutes or more of down time for their use of the Quickbase platform while the public authentication certificate on their IdP may not match the certificate used on the Quickbase platform. The “Signed Authn Requests” option is only visible to Quickbase staff and can only be changed by Quickbase staff. It should only be enabled when a customer informs Quickbase of the customer's intention to configure their IdP to require signing of authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If a customer wants to know if they are using the “Signed Authn Requests” option, or would like the option enabled or disabled, they can open a support case with Quickbase Technical Support. In order to validate that the signed authentication requests actually come from Quickbase, we provide the customer with a public authentication certificate. Customers using the “Signed Authn Requests” option must ensure their IdP is configured with the public authentication certificate currently being used by the Quickbase platform to sign authentication requests made by the Quickbase platform to the customer's IdP as part of the SAML authentication process. If the public authentication certificate configured in the customer’s IdP does not match the public authentication certificate being used by Quickbase, the customer will not be able to authenticate successfully to the Quickbase platform. *Quickbase has no ability to know if or how a customer has configured their IdP. We therefore cannot tell a customer if their IdP is requiring Quickbase to sign authentication requests and we cannot tell a customer if the public authentication certificate Quickbase is using matches the certificate the customer has configured in their IdP. Quickbase rotates the public authentication certificate every year and distributes it to applicable customers inside a certificate file via this Quickbase Community post. Quickbase determines the applicable customers based on which have the “Signed Authn Requests” option enabled in their Quickbase SAML configuration. During the period of time starting on the date that we announce our intention to update the certificate, and ending after the date/time we actually update the certificate on the Quickbase platform, we make both the current and new certificates available in this Community post. After we update the certificate on the Quickbase platform, we then remove the now out-of-date certificate from this Community post. Prior to the annual public authentication certificate rotation period, Quickbase will communicate via in-product messaging and possibly also e-mail to Quickbase realm and account administrators at the applicable customers the specific date/time on which we intend to update the certificate on the Quickbase platform. When Quickbase updates the certificate, we do so during a 15 minute maintenance period on the announced date/time. We strive to provide customers with enough notice of this maintenance period for them to notify their responsible staff, typically their IT department or whichever group within the customer’s organization is responsible for administering their identify provider (IdP) system. The customer’s IdP administrator should plan to update the public authentication certificate provided by Quickbase during the 15 minute maintenance period announced by Quickbase. Doing so will minimize the chance of the customer experiencing any interruption of their use of the Quickbase platform. PLEASE NOTE: For any customer using the “Signed Authn Requests” option, i.e., requiring signing of authentication requests made by the Quickbase platform to the customer's IdP, any time the public authentication certificate used by Quickbase does not match the public authentication certificate configured in the customer's IdP, logins to the Quickbase platform will fail. It is therefore essential that the customer update the public authentication certificate in their IdP during the 15 minute maintenance period announced by Quickbase annually. Quickbase Public Authentication Certificate Rotation Maintenance Window Quickbase plans to update the public authentication certificate on Wednesday, November 20, 2024, between 8:00 PM and 8:15 PM Eastern US Time. Current and New Public Authentication Certificates The NEW public authentication certificate is provided below for you to download and install on your identify provider during the 15 minute maintenance period. The zip file contains both the metadata (with certificate contained inside) as well as the certificate on its own. New Certificate (Expires October 30th, 2026): QB_SAML_Exp10-30-2026.zip Current Certificate: (Expires November 25, 2025): QB_SAML_Exp11-25-2025.zip Additional Information on SAML Public Authentication Certificate Configuration Scenarios and Expected Outcomes This section describes several scenarios that could exist specific to a Quickbase customer using SAML authentication for access to the Quickbase platform. Quickbase SAML configuration option “Signed Authn Requests” is disabled, and Customer does not configure their IdP to require signing of SAML authentication requests. In this case, logins to the Quickbase platform will work normally assuming there are no other SAML configuration issues. There is no use of public certificates in this scenario. Quickbase SAML configuration option “Signed Authn Requests” is disabled, and Customer configures their IdP to require signing of SAML authentication requests, and has the currently applicable public authentication certificate from Quickbase installed in their IdP. In this case, logins to the Quickbase platform will fail because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed and Quickbase is not signing them because the “Signed Authn Requests” option is disabled. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer configures their IdP to require signing of SAML authentication requests, and has the currently applicable public authentication certificate from Quickbase installed in their IdP. In this case, logins to the Quickbase platform will work normally because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed using the currently applicable public authentication certificate and Quickbase is signing them with that same public authentication certificate. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer configures their IdP to require signing of SAML authentication requests, and has a public authentication certificate installed in their IdP that is either expired, or does not match the public authentication certificate currently being used by Quickbase. In this case, logins to the Quickbase platform will fail because the Customer's IdP is expecting authentication requests from Quickbase to the IdP to be signed using the public authentication certificate they have configured in their IdP and Quickbase is signing them with a different public authentication certificate. Quickbase SAML configuration option “Signed Authn Requests” is enabled, and Customer does not configure their IdP to require signing of SAML authentication requests. In this case, logins to the Quickbase platform may or may not work normally depending on the IdP and how it handles a signed request. Quickbase cannot anticipate how different IdPs may handle this scenario. The solution is to open a case with Quickbase Technical Support and request that the “Signed Authn Requests” option be disabled.2likes0CommentsUnlock Document Insights with AI Actions: Summarizing a 10-K Filing in Pipelines
About a week ago, I showed how AI Actions can extract key details from emails and structure them for use in Pipelines. Today, let’s take it a step further — using AI Actions to analyze entire documents. And not just any document, but something a little more substantial — a 10-K filing. Why a 10-K? A company’s annual 10-K report is a goldmine of information: performance trends, risk factors, and management insights. But let’s be honest — few people have the time (or patience) to read through hundreds of pages. With AI Actions, Quickbase users can upload a 10-K file and automatically generate a concise, executive-ready summary — right inside Quickbase. No APIs, no custom models. Just a pipeline. The Pipeline Flow Here’s how the process looks end-to-end: Trigger: A new 10-K document is uploaded to a Quickbase table (e.g., Filings). AI Action: The file is securely sent to the AI with a rich financial analysis prompt. Result: The AI returns a summary recorded in a rich text field - ready to be shared in your app. Watch the demo here. Example Pipeline and 10-K Amazon's 10-K - https://ir.aboutamazon.com/sec-filings/default.aspx Pipeline YAML: # Dcoument Summary # # Account slugs: # - quickbase[REDACTED]: Realm Default Account <None> --- - META: name: Dcoument Summary enabled: false - TRIGGER quickbase[REDACTED] record on_create -> a: inputs-meta: export_fields: '"10-K File, Summary" <6, 7>' table: '"AI Actions - Georgi Peev: 10-K" <REDACTED>' name: Document uploaded - ACTION qb-ai-actions custom_action create -> b: inputs: file_url: '{{a.n10_k_file.file_transfer_handle}}' system_message: "**Role:**\n\nYou are an elite financial analyst specializing\ \ in evaluating the financial health, performance, and outlook of Fortune\ \ 500 companies. You analyze company financial statements, ratios, and macroeconomic\ \ factors to produce clear, executive-ready insights.\n\n**Tone & Personality:**\n\ \nYou are professional, analytical, and articulate. You communicate findings\ \ in a clear, structured format that's easy to read in Quickbase. Avoid excessive\ \ jargon \u2014 your goal is to make complex financial information understandable\ \ and actionable.\n\n**Core Capabilities:**\n\nAnalyze **income statements**,\ \ **balance sheets**, and **cash flows**\n* Evaluate **profitability**, **liquidity**,\ \ **leverage**, and **efficiency ratios**\n* Perform **trend and comparative\ \ analysis** versus peers\n* Assess **valuation metrics**, **risk factors**,\ \ and **growth outlooks**\n* Integrate **macroeconomic context** into your\ \ conclusions\n* Generate **forward-looking insights** backed by quantitative\ \ reasoning\n---\n\n**Formatting & Output Rules (Quickbase-Friendly)**\n\n\ Your output **must be formatted in HTML**, using the following conventions\ \ to ensure clear line breaks and sectioning: \n\nUse `<h2>` for major sections\ \ (e.g., Executive Summary, Outlook).\nUse `<h3>` for subsections (e.g., Overview,\ \ Key Ratios).\nUse `<p>` for paragraphs.\nUse `<ul>` and `<li>` for bullet\ \ lists.\nUse `<strong>` for bold metrics or key figures.\nAdd `<br>` only\ \ when you need an extra visual line break inside a section.\nDo **not** use\ \ Markdown (`##`, `-`, `**`, etc.).\nKeep output readable and well-spaced\ \ \u2014 each section should be visually distinct.\nEnd with a short concluding\ \ paragraph summarizing the company's outlook." user_message: Process the file provided. name: Process document - a<>ACTION quickbase record update -> c: inputs: summary: '{{b.output_text}}' name: Save summary ... The AI Prompt Here’s the full system prompt passed to AI Actions — formatted for clear output inside a Quickbase rich text field. **Role:** You are an elite financial analyst specializing in evaluating the financial health, performance, and outlook of Fortune 500 companies. You analyze company financial statements, ratios, and macroeconomic factors to produce clear, executive-ready insights. **Tone & Personality:** You are professional, analytical, and articulate. You communicate findings in a clear, structured format that's easy to read in Quickbase. Avoid excessive jargon — your goal is to make complex financial information understandable and actionable. **Core Capabilities:** Analyze **income statements**, **balance sheets**, and **cash flows** * Evaluate **profitability**, **liquidity**, **leverage**, and **efficiency ratios** * Perform **trend and comparative analysis** versus peers * Assess **valuation metrics**, **risk factors**, and **growth outlooks** * Integrate **macroeconomic context** into your conclusions * Generate **forward-looking insights** backed by quantitative reasoning --- **Formatting & Output Rules (Quickbase-Friendly)** Your output **must be formatted in HTML**, using the following conventions to ensure clear line breaks and sectioning: Use `<h2>` for major sections (e.g., Executive Summary, Outlook). Use `<h3>` for subsections (e.g., Overview, Key Ratios). Use `<p>` for paragraphs. Use `<ul>` and `<li>` for bullet lists. Use `<strong>` for bold metrics or key figures. Add `<br>` only when you need an extra visual line break inside a section. Do **not** use Markdown (`##`, `-`, `**`, etc.). Keep output readable and well-spaced — each section should be visually distinct. End with a short concluding paragraph summarizing the company's outlook. File Tips To stay within the 2 MB file limit: Upload just the relevant sections of documents. Compress PDFs or use text-based files. Avoid exhibits, charts, or large tables that aren’t text-based. Why This Matters This example shows how AI Actions can do more than summarize — it can transform complex corporate filings into clear insights your team can act on. Whether you’re building dashboards for operations teams or automating document reviews, AI Actions lets you bring analytical intelligence directly into your workflows. Conclusion AI Actions isn’t just about connecting to AI — it’s about empowering Quickbase users to extract real business value from their data and documents. Start small: upload a company’s 10-K, run your pipeline, and see how much time your team can save. You’ll never look at financial reports the same way again. Stay tuned for my next blogpost where I will be creating a weekly summary from a Quickbase report.2likes0Comments