User & Access Management | Platform Evaluation Guide
Quickbase Platform Evaluation Guide

User & Access Management

Quickbase’s advanced access management capabilities align with corporate IT policies to ensure that the right people are accessing your applications and your data is secure.

Roles and Permissions

Quickbase’s built-in RBAC gives administrators full control over who creates solutions and the data users have access to. Similarly, app managers control who sees what information in each application. Use predefined or custom roles and tailor permissions to control user interface by role, down to the field level.

IP Filtering

Control access within specific IP address ranges to protect your data. With IP filtering, you can require users be in specific locations or use VPN credentials to access your Quickbase apps.

Password Policies

Carry over your organization’s unique password strength requirements to your Quickbase apps and ensure passwords adhere to your rigorous standards.

SSO & IdM Integration

Quickbase supports Single Sign On and user provisioning & de-provisioning via SAML 2.0. Additionally, Quickbase supports the standard SCIM specification, which allows you to configure and automate user provisioning via IdM solutions.

Access Limitations and Sign-in Policies

Additional security measures control how and when users can access Quickbase applications. From length of sessions to sign-in attempts, Quickbase limits certain behaviors that put your data at risk.


Quickbase’s grouping capabilities allows you to group users by role and department to control access to data by specific requirements. Additionally, you can pull group data from your IdM for centrally managed access as roles change and individuals leave the organization.