diff --git a/guides/common/modules/con_configuring-active-directory-as-an-external-identity-provider-for-project.adoc b/guides/common/modules/con_configuring-active-directory-as-an-external-identity-provider-for-project.adoc index bcf75ce6d00..a63844dc745 100644 --- a/guides/common/modules/con_configuring-active-directory-as-an-external-identity-provider-for-project.adoc +++ b/guides/common/modules/con_configuring-active-directory-as-an-external-identity-provider-for-project.adoc @@ -18,6 +18,11 @@ The recommended setup consists of two steps: * Enrolling {ProjectServer} with the Active Directory server as described in xref:Enrolling_Server_with_the_AD_Server_{context}[]. * Configuring direct Active Directory integration with GSS-proxy as described in xref:Configuring_Direct_AD_Integration_with_GSS_Proxy_{context}[]. +{Team} supports {Project} integration with AD instances that run on the following Windows Server versions: + +* Windows Server 2022 +* Windows Server 2019 + ifndef::orcharhino[] For information about integrating {RHEL} systems with Active{nbsp}Directory, see link:{RHELDocsBaseURL}8/html/integrating_rhel_systems_directly_with_windows_active_directory/index[{RHEL}{nbsp}8 _Integrating RHEL systems directly with Windows Active Directory_]. endif::[]