The rsecadmin log also shows a section where authorizations are combined. This begs a bigger question: How are authorizations combined together? The authorizations listed as being combined together do not share the same fields, so how can they be combined?
Understanding how the authorizations are combined is critical to understanding how to correctly create the security.