Preview

Amadeus Guide 1

Good Essays
Open Document
Open Document
23882 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Amadeus Guide 1
The Complete
Amadeus Manual

Jasir Alavi

Sign In/ Sign Out

HEJI

Amadeus Work Areas
Amadeus provides six (6) work areas in which a travel agent may sign-in to. These work areas are known as
Agent Assembly Areas (AAA’s). The work areas could be considered as six separate connections to
Amadeus where you can create or modify reservations. The six work areas are each given an identifier A through F.
The command to display the status of the work areas is:
JD
Screen Display

Any work area will automatically sign-out if left idle for a 3-hour period. Any data pending in that work area will be ignored.
Sign In/Sign Out Command
The Amadeus system requires each user to sign-in and identify themselves so that the users sign-in code can be recorded in reservations. The sign-in command is often referred to as "Jump In" due to the command identifier JI.
There are two duty codes used in the JI command, Agent Sell (travel agents only) (AS) and Supervisor
(SU).
Command Format
JI<Agent Sign / Duty Code>
Example
JI1234AB/AS

Other Commands and Options
JI*1234AB/AS

Sign into all six work areas A, B, C, D, E, F.

JD

Display your work area status.

JMB

Move from current work area to work area B.

JO

Sign out of current work area only

JOA

Sign out of specific work area A (Jump Out)

JO*

Sign out of all work areas A/B/C/D/E/F

JXC

Move to work area C with existing Sign in by default

Practice Training

HEJJ

The Practice Training system is a part of the Amadeus Central System where you can simulate transactions.
In this way, you can experience working in the Amadeus Central System without affecting real flight inventory. The system appends the notation *TRN* to your screen displays to indicate that you are using Practice
Training.
The Practice Training system sign in command identifier is JJ.
Command Format
JJ<Agent Sign> / <Duty Code>
Command Example

JJ1234AB/AS

Sign next available work area into Practice Training system Screen Display

Other Commands and Options
JMA Move

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Each workstation will be set up to automatically lock the screen after 3 minutes of no use. Employees will be trained on how to keep their workstations and network credentials secure. Under no circumstances are employees to use flash drives or any type of external…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Precondition: |The customer must had in the past logged on then the system can record and recognition as each user, technician |…

    • 621 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    Group Policy Object that will display information about previous logons while you are trying to login yourself. So basically, you are going to be able to see who has logged on to the machine before you.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Good Essays

    Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Oneblood Mission Statement

    • 1690 Words
    • 7 Pages

    They also created state of the art simulation training in their facility. Everyone learns differently everyone is unique and that’s why Oneblood has different training steps. Employees first train with online training module which helps people who learn best by visual and verbal learning styles. The second stage of training is hands on training with simulation training. Employees practice their skills and apply knowledge gained in the previous training. This approach ensures employees meet Oneblood standards. On hands training allows staff to focus on SOP’s, gain confidence, and receive individual training form the…

    • 1690 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Staff and visitors have to sign in and out using an electronic scanning system. Each member of staff/visitor has a card with photo ID, name and bar code to identify themselves and use to sign in and out of the premises.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ptlls Assignment 4

    • 1103 Words
    • 5 Pages

    • Simulation - Learners can act out real life situations to prove knowledge and competency prior to having to deal with the situation for real.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Reflective Piece

    • 1888 Words
    • 8 Pages

    I then use the sign in book to document my attendance. The importance of this is imperative for fire regulations, company policy and for calculating hours worked for the returns and pay at the end of the month. I personally find reviewing the sign in book and rota useful as I am able to see which of the staff team have signed in and are on shift today. I am able to evaluate the relative strengths and any possible weaknesses of the staff available and plan activities and tasks accordingly.…

    • 1888 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Childrens Act

    • 654 Words
    • 3 Pages

    * Signing in / out procedures must be followed at all times and passwords adhered to…

    • 654 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Offers wide range from crew member – assistant manager. This can cater to each individual’s skills whether they are a public person or a person behind the scenes.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Every laptop, PDA, desktop or workstations must be secured with a password protected screensaver and with a activation lock of 15 minutes or less. All employees must log off when they are finished using the device.…

    • 441 Words
    • 2 Pages
    Good Essays

Related Topics