Managing and Maintaining a Realm

This topic refers to functionality that is only available to accounts on the Quick Base Platform or Quick Base Unlimited plans. If you do not see the functionality described here, either your account or realm has not been configured to show it, or your account is not on one of those plans.

Shared responsibility and the cloud

Quick Base is a cloud service, technically known as an Application Platform as a Service (aPaaS). As a cloud service, Quick Base ensures the security and availability of the Quick Base platform while you (as the customer) are responsible for managing users, apps, and data in your Quick Base realm. A Quick Base realm is a logical slice of Quick Base dedicated to your organization that you control. Realms are defined using a DNS sub-domain with the format:

Roles and responsibilities of a Quick Base realm admin

As a Quick Base realm admin—that is, a user assigned to the Realm Admin role—you are responsible for setting up and maintaining your Quick Base realm, which includes user and data governance and setting security controls in line with your company’s requirements.

Realm admins:

Define realm authentication

Organizations may choose to use Quick Base independently of federation, in which case users and groups are solely managed within Quick Base, or customers may enable federated user authentication to their Quick Base realm using Security Assertion Markup Language (SAML) version 2.0.

SAML is an is an open XML-based framework used to exchange authentication and authorization data between an identity provider (IdP) and a service provider (SP) such as Quick Base.

As a single-sign on (SSO) method, SAML enables users to access and log in to multiple websites using one set of credentials. SAML is the link between the authentication of a user’s identity and the authorization to use a service.

Best Practice: Quick Base recommends using SAML for authentication.

As a single-sign on (SSO) method, SAML enables users to access and log in to multiple websites using one set of credentials. For example, when a user leaves your organization, disabling that user from your Active Directory also automatically removes access to any service which that identity is associated through SAML, such as Quick Base. Additionally, when using SAML, organizations can maintain consistent security controls such as password complexity or two-factor authentication across their IT assets and service providers.

For more details about SAML and Quick Base, click here.