diff --git a/modules/saml/docs/sp.txt b/modules/saml/docs/sp.txt index 0ae5b8db22dd01d3e7d40df5ab577b0b2bd4957e..d710245fc967c7cd907656697ae79a004047e336 100644 --- a/modules/saml/docs/sp.txt +++ b/modules/saml/docs/sp.txt @@ -22,7 +22,7 @@ All these parameters override the equivalent option from the configuration. : *Note*: SAML 2 specific. -`ForceAuthnn` +`ForceAuthn` : Force authentication allows you to force re-authentication of users even if the user has a SSO session at the IdP. : *Note*: SAML 2 specific. diff --git a/modules/saml/lib/Auth/Source/SP.php b/modules/saml/lib/Auth/Source/SP.php index f869414eac3fd3b62d5dde76fd5de85e51fff878..8d209cff2a468372c1f44fff696120bd847838e7 100644 --- a/modules/saml/lib/Auth/Source/SP.php +++ b/modules/saml/lib/Auth/Source/SP.php @@ -193,7 +193,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source { $ar->setRequestedAuthnContext(array('AuthnContextClassRef' => $accr)); } - if (isset($state['ForceAuthnn'])) { + if (isset($state['ForceAuthn'])) { $ar->setForceAuthn((bool)$state['ForceAuthn']); } diff --git a/modules/saml/lib/IdP/SAML2.php b/modules/saml/lib/IdP/SAML2.php index e1bafa37e9303baf3dfa0e3b5f9dc3d9fb3c304b..e5951696c25bad6879b65f81a03a166ad9732147 100644 --- a/modules/saml/lib/IdP/SAML2.php +++ b/modules/saml/lib/IdP/SAML2.php @@ -321,7 +321,7 @@ class sspmod_saml_IdP_SAML2 { 'saml:IDPList' => $IDPList, 'saml:ProxyCount' => $ProxyCount, 'saml:RequesterID' => $RequesterID, - 'ForceAuthnn' => $forceAuthn, + 'ForceAuthn' => $forceAuthn, 'isPassive' => $isPassive, 'saml:ConsumerURL' => $consumerURL, 'saml:Binding' => $protocolBinding,