diff --git a/files/squid/helpers/rules.d/rstudio.rules b/files/squid/helpers/rules.d/rstudio.rules
index fd05b07317b794fe7d51b14fd19a0edf56b3e44e..7b9d48046b9d8e162cc3e6cb16eb79499e792c3b 100644
--- a/files/squid/helpers/rules.d/rstudio.rules
+++ b/files/squid/helpers/rules.d/rstudio.rules
@@ -26,6 +26,8 @@
 ^https?://shiny\.rstudio\.com/reference/shiny/.*        true
 ^https?://www\.jasondavies\.com/wordtree/.*             true
 ^https?://www\.ida\.liu\.se/~732A98/.*			true
+^https?://www\.gpsvisualizer\.com/atlas\.html          false
+^https?://www\.gpsvisualizer\.com/.*                    true
 
 // For plot.ly
 ^https?://ajax\.googleapis\.com/ajax/libs/.*\.js         true
diff --git a/files/sudoers_aes b/files/sudoers_aes
index aa07290f00a6e12cf8a53e53f3621e568f2b5ec1..c348355c20405e19739743fb65cce4aec8682e01 100644
--- a/files/sudoers_aes
+++ b/files/sudoers_aes
@@ -1,8 +1,8 @@
 klaar36 ALL=(ALL) NOPASSWD: ALL
 filst04 ALL=(ALL) NOPASSWD: ALL
 
-User_Alias EXAM_ADMINS = torjo38, klaar36, vikol94, magni54, filst04
-Runas_Alias EXAM_USER = examadm, %examadm, opendsa, %opendsa
+User_Alias EXAM_ADMINS = torjo38, klaar36, vikol94, magni54, filst04, emmen85
+Runas_Alias EXAM_USER = examadm, %examadm, opendsa, %opendsa, squid, %squid
 
 Cmnd_Alias SERVICE_CMDS = /usr/bin/systemctl, /usr/bin/less
 
diff --git a/manifests/autocorr.pp b/manifests/autocorr.pp
new file mode 100644
index 0000000000000000000000000000000000000000..937f778b38e3abcab7762b0db5ed6ba5962f62c4
--- /dev/null
+++ b/manifests/autocorr.pp
@@ -0,0 +1,38 @@
+class aes::autocorr {
+
+  $autocorr_user = autocorr
+  $autocorr_group = $autocorr_user
+  $autocorr_home = "/home/${autocorr_user}"
+
+  user { 'autocorr' :
+    ensure     => present,
+    managehome => false,
+    membership => inclusive,
+    system     => true,
+    shell      => '/bin/bash',
+  }
+
+  file { $autocorr_home:
+    ensure => directory,
+    mode   => '0755',
+    owner  => $autocorr_user,
+    group  => $autocorr_group,
+  }
+
+  file { "${autocorr_home}/.ssh":
+    ensure => directory,
+    mode   => '0700',
+    owner  => $autocorr_user,
+    group  => $autocorr_group,
+  }
+
+  file { "${autocorr_home}/.ssh/authorized_keys":
+    ensure  => file,
+    mode   => '0600',
+    owner  => $autocorr_user,
+    group  => $autocorr_group,
+    content => @(SSHPUBKEY),
+command="if [[ \"$SSH_ORIGINAL_COMMAND\" =~ ^scp[[:space:]]-f[[:space:]]/home/examadm/Version-3.1/exam/[[:space:]0-9a-zA-Z_/.-]*$ ]]; then $SSH_ORIGINAL_COMMAND; else >&2 echo \"ERROR Access Denied ('$SSH_ORIGINAL_COMMAND')\"; fi",no-pty,no-user-rc,no-port-forwarding,no-agent-forwarding,no-X11-forwarding ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCu/so6GPeUOpK0Zeiv8pM4UF4BAGnbjc92rYJP7PH2tnCvzTcj7Zx5fw6oyoFPw7SJ21ybIYHr1Eef7LsfJc6lOx/xNm8XABhOJw7Gy12WnjRF9SmsT7+YqJDvDOeN89PvzmHNdhpCerpdhDGvAKu2MjP2fAEW0eIgHWYfzFwQxXqfsEdKYAtIx0v/VTLxFjtZOz5PQGAPR28NZkffMt1ePaAO5WUwjkxcyIbrtrOWWYDtqa9G7gTwgdf7m9IG69G6sqKGzyZrfd0nrpMmtWmX6/9bWwUk1ADaLdEFiupsZ9k+QsLB7/v7fxzbPD61yAJ75JUecghlXFJ4ob9OsmPz torjo@upp
+    | SSHPUBKEY
+  }
+}
diff --git a/manifests/init.pp b/manifests/init.pp
index 89032e8aff60196efb82c4d4d2c37b3ce4a52b57..9efa2222aba90ff202a9d4ed3e515fa56fe58252 100644
--- a/manifests/init.pp
+++ b/manifests/init.pp
@@ -8,6 +8,7 @@ class aes {
   include aes::broker
   include aes::auth
   include aes::auth_keydb
+  include aes::autocorr
   include liurepo::centos_sclo_rh
 
   package {
@@ -100,6 +101,12 @@ class aes {
     sshkey     => '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', # lint:ignore:140chars
   }
 
+  ::users::liu_user { 'emmen85':
+    commonname => 'Emma Enocksson Svensson',
+    shell      => '/bin/bash',
+    sshkey     => 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCsUKr53aCwErzsdhD/5oEQ4gWW51NgXa70Ow20Fnv/pyKAepDsIMCOB6kf1aET8LOlnq8Wyu0/52GGB38mO6cUzi7MLeWj7bg1Npq7b5/Uoaquq/dginoVQDc5RuJfmoy7PwmjKep/J2OIkCs8kD4sKbqN3ArCW555hgBvlGCdHxER1x2c5wGc2iuMCcbsfonOfORIxzCoiF4igfmuA1wpFZgyjBLuHn/SOtp85pD3nR0JSiaJWcMLB7IkWzXxvbpUWhDf7/gE4mwCDkOajY8zdG+aLkAZI0J1TJUGq50zji4OouwxxPW2JhpVl1KbRPqec+pVtdQIZstgUg3YbJGl', # lint:ignore:140chars
+  }
+
   ::server_firewall::rules_file { '45-permit_squid.rules':
     content => @(EOF),
     service squid is tcp/3128