With the help of this action, a user can register the configured application and the corresponding 2FA device type with the authenticator app.
This action is part of the two-factor authentication concept and is described in more detail in the chapter Two-factor authentication (Concept).