This table shows all valid combinations of access authorization selections that relate to events. The setting of the Change Auth authorization is not shown here because it functions independently of the event authorization selections.