diff --git a/modules/saml/docs/sp.txt b/modules/saml/docs/sp.txt
index 0ae5b8db22dd01d3e7d40df5ab577b0b2bd4957e..d710245fc967c7cd907656697ae79a004047e336 100644
--- a/modules/saml/docs/sp.txt
+++ b/modules/saml/docs/sp.txt
@@ -22,7 +22,7 @@ All these parameters override the equivalent option from the configuration.
 :   *Note*: SAML 2 specific.
 
 
-`ForceAuthnn`
+`ForceAuthn`
 :   Force authentication allows you to force re-authentication of users even if the user has a SSO session at the IdP.
 
 :   *Note*: SAML 2 specific.
diff --git a/modules/saml/lib/Auth/Source/SP.php b/modules/saml/lib/Auth/Source/SP.php
index f869414eac3fd3b62d5dde76fd5de85e51fff878..8d209cff2a468372c1f44fff696120bd847838e7 100644
--- a/modules/saml/lib/Auth/Source/SP.php
+++ b/modules/saml/lib/Auth/Source/SP.php
@@ -193,7 +193,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source {
 			$ar->setRequestedAuthnContext(array('AuthnContextClassRef' => $accr));
 		}
 
-		if (isset($state['ForceAuthnn'])) {
+		if (isset($state['ForceAuthn'])) {
 			$ar->setForceAuthn((bool)$state['ForceAuthn']);
 		}
 
diff --git a/modules/saml/lib/IdP/SAML2.php b/modules/saml/lib/IdP/SAML2.php
index e1bafa37e9303baf3dfa0e3b5f9dc3d9fb3c304b..e5951696c25bad6879b65f81a03a166ad9732147 100644
--- a/modules/saml/lib/IdP/SAML2.php
+++ b/modules/saml/lib/IdP/SAML2.php
@@ -321,7 +321,7 @@ class sspmod_saml_IdP_SAML2 {
 			'saml:IDPList' => $IDPList,
 			'saml:ProxyCount' => $ProxyCount,
 			'saml:RequesterID' => $RequesterID,
-			'ForceAuthnn' => $forceAuthn,
+			'ForceAuthn' => $forceAuthn,
 			'isPassive' => $isPassive,
 			'saml:ConsumerURL' => $consumerURL,
 			'saml:Binding' => $protocolBinding,