diff --git a/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml b/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml
index 4b0e19f..56f4631 100755
--- a/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml
+++ b/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml
@@ -842,6 +842,10 @@ $ keytool -import -alias yourdomain -keystore keycloak.jks -file your-certificat
         <section id="proxy-address-forwarding">
             <title>Configure reverse proxy for address forwarding</title>
             <para>
+                Keycloak needs to know the original request URL as this is needed for example to set the correct issuer in tokens as well as redirects, links, etc.
+                This requires the reverse proxy to pass the original <literal>Host</literal> header.
+            </para>
+            <para>
                 Keycloak has some functionalities (for example <link linkend='events'>Events</link> or <link linkend="brute-force-attacks">Brute Force protector</link>)
                 that relies on the fact, that remote address of the HTTP connection is the real IP address of the client machine. This may be a bit tricky when you have setup
                 with reverse proxy or loadbalancer.