Using this action, a user can deregister the configured application and the corresponding 2FA device type of a previously registered authenticator app.
This action is part of the two-factor authentication concept and is described in more detail in the chapter Two-factor authentication (Concept).