diff --git a/ee/spec/requests/api/internal/base_spec.rb b/ee/spec/requests/api/internal/base_spec.rb
index 01ff656363fe47886864729ff778d79df99db40c..25ab537ced024182c53303cf6df451f0ec33786a 100644
--- a/ee/spec/requests/api/internal/base_spec.rb
+++ b/ee/spec/requests/api/internal/base_spec.rb
@@ -500,122 +500,6 @@ def lfs_auth_user(user_id, project)
     end
   end
 
-  describe 'POST /internal/two_factor_otp_check' do
-    let_it_be(:key) { create(:key, user: user) }
-
-    let(:key_id) { key.id }
-    let(:otp) { '123456' }
-
-    before do
-      stub_feature_flags(two_factor_for_cli: true)
-      stub_licensed_features(git_two_factor_enforcement: true)
-    end
-
-    subject do
-      post api('/internal/two_factor_otp_check'),
-           params: { key_id: key_id, otp_attempt: otp },
-           headers: gitlab_shell_internal_api_request_header
-    end
-
-    it_behaves_like 'actor key validations'
-
-    context 'when the key is a deploy key' do
-      let(:key_id) { create(:deploy_key).id }
-
-      it 'returns an error message' do
-        subject
-
-        expect(json_response['success']).to be_falsey
-        expect(json_response['message']).to eq('Deploy keys cannot be used for Two Factor')
-      end
-    end
-
-    context 'when the two factor is enabled' do
-      before do
-        allow_any_instance_of(User).to receive(:two_factor_enabled?).and_return(true) # rubocop:disable RSpec/AnyInstanceOf
-      end
-
-      context 'when the OTP is valid' do
-        it 'registers a new OTP session and returns success' do
-          allow_next_instance_of(Users::ValidateManualOtpService) do |service|
-            allow(service).to receive(:execute).with(otp).and_return(status: :success)
-          end
-
-          expect_next_instance_of(::Gitlab::Auth::Otp::SessionEnforcer) do |session_enforcer|
-            expect(session_enforcer).to receive(:update_session).once
-          end
-
-          subject
-
-          expect(json_response['success']).to be_truthy
-        end
-      end
-
-      context 'when the OTP is invalid' do
-        before do
-          allow_next_instance_of(Users::ValidateManualOtpService) do |service|
-            allow(service).to receive(:execute).with(otp).and_return(status: :error)
-          end
-        end
-
-        it 'is not success' do
-          subject
-
-          expect(json_response['success']).to be_falsey
-        end
-      end
-    end
-
-    context 'when the two factor is disabled' do
-      before do
-        allow_any_instance_of(User).to receive(:two_factor_enabled?).and_return(false) # rubocop:disable RSpec/AnyInstanceOf
-      end
-
-      it 'returns an error message' do
-        subject
-
-        expect(json_response['success']).to be_falsey
-        expect(json_response['message']).to eq 'Two-factor authentication is not enabled for this user'
-      end
-    end
-
-    context 'feature flag is disabled' do
-      before do
-        stub_feature_flags(two_factor_for_cli: false)
-      end
-
-      context 'when two-factor is enabled for the user' do
-        it 'returns user two factor config' do
-          allow_next_instance_of(User) do |instance|
-            allow(instance).to receive(:two_factor_enabled?).and_return(true)
-          end
-
-          subject
-
-          expect(json_response['success']).to be_falsey
-        end
-      end
-    end
-
-    context 'licensed feature is not available' do
-      before do
-        stub_licensed_features(git_two_factor_enforcement: false)
-      end
-
-      context 'when two-factor is enabled for the user' do
-        it 'returns user two factor config' do
-          allow_next_instance_of(User) do |instance|
-            allow(instance).to receive(:two_factor_enabled?).and_return(true)
-          end
-
-          subject
-
-          expect(json_response['success']).to be_falsey
-        end
-      end
-    end
-  end
-
   describe 'POST /internal/two_factor_manual_otp_check' do
     let_it_be(:key) { create(:key, user: user) }
 
diff --git a/lib/api/internal/base.rb b/lib/api/internal/base.rb
index 6f475fa8d74b77931fbbf2d9df99b49e675c30b0..c4464666020153384ff6206b939c69a5714c2334 100644
--- a/lib/api/internal/base.rb
+++ b/lib/api/internal/base.rb
@@ -133,11 +133,6 @@ def validate_actor(actor)
           'Could not find a user for the given key' unless actor.user
         end
 
-        # TODO: backwards compatibility; remove after https://gitlab.com/gitlab-org/gitlab-shell/-/merge_requests/454 is merged
-        def two_factor_otp_check
-          { success: false, message: 'Feature is not available' }
-        end
-
         def two_factor_manual_otp_check
           { success: false, message: 'Feature is not available' }
         end
@@ -339,13 +334,6 @@ def with_admin_mode_bypass!(actor_id)
           end
         end
 
-        # TODO: backwards compatibility; remove after https://gitlab.com/gitlab-org/gitlab-shell/-/merge_requests/454 is merged
-        post '/two_factor_otp_check', feature_category: :authentication_and_authorization do
-          status 200
-
-          two_factor_manual_otp_check
-        end
-
         post '/two_factor_push_otp_check', feature_category: :authentication_and_authorization do
           status 200
 
diff --git a/spec/requests/api/internal/base_spec.rb b/spec/requests/api/internal/base_spec.rb
index 9faeadc84331ec00447c6773226f1c8062c106b2..26849a8eea00b5ebdc9600d1cae3265716969db1 100644
--- a/spec/requests/api/internal/base_spec.rb
+++ b/spec/requests/api/internal/base_spec.rb
@@ -1502,24 +1502,6 @@ def request
     end
   end
 
-  describe 'POST /internal/two_factor_otp_check' do
-    let(:key_id) { key.id }
-    let(:otp) { '123456' }
-
-    subject do
-      post api('/internal/two_factor_otp_check'),
-           params: { key_id: key_id, otp_attempt: otp },
-           headers: gitlab_shell_internal_api_request_header
-    end
-
-    it 'is not available' do
-      subject
-
-      expect(json_response['success']).to be_falsey
-      expect(json_response['message']).to eq 'Feature is not available'
-    end
-  end
-
   describe 'POST /internal/two_factor_manual_otp_check' do
     let(:key_id) { key.id }
     let(:otp) { '123456' }