Apple Pay - Setup and Troubleshooting
KA-08853
115
12/18/2025 18:43 PM
1.2
Introduction
Use this article to configure Apple Pay with Cybersource and resolve the most common configuration, cryptogram/DSRP, and acquirer-specific wallet authorization issues. The guide provides setup steps, validation procedures, and structured troubleshooting aligned to merchant expectations and Support efficiency needs.
1. Prerequisites Checklist
- Apple Pay enabled on each Cybersource profile
- Sandbox and production Cybersource accounts
- Apple Developer Program account (Account Holder or Admin)
- Apple Pay Merchant ID created
- Acquirer certified for Mastercard MDES network tokens
- Merchant domain supports HTTPS with valid TLS
- Sandbox tester Apple ID & Mastercard test cards
- (Web) Ability to host the Apple verification file at the required path
2. Register the Apple Pay Merchant ID
- Sign in to Apple Developer.
- Select Certificates & Identifiers → Identifiers.
- Click + → Merchant IDs and continue.
- Enter the identifier (e.g.,
merchant.com.example.test). - Click Register.
3. Create the Payment Processing Certificate
3A • Cybersource-Managed Decryption (Recommended)
- Go to Business Center → Payment Configuration → Digital Payment Solutions → Apple Pay.
- Enter the Merchant ID.
- Select Generate New CSR & download the
.certSigningRequest. - Upload the CSR in Apple Developer and download the
.cerfile.
3B • Merchant-Managed Decryption (If Required)
- Open Keychain Access → Certificate Assistant (macOS).
- Generate a 2048‑bit RSA CSR.
- Upload CSR → download
.cer→ import to Keychain → export a.p12. - Deploy the
.p12to the merchant’s decryption service.
4. Optional: Enable Apple Pay on the Web
- Create an Apple Pay Merchant Identity certificate (TLS).
- Register each domain:
- Go to Merchant Domains → Add Domain.
- Download the verification file.
- Host it at:
/.well-known/apple-developer-merchantid-domain-association - Click Verify.
5. Sandbox Validation
- Sign in to a test device using the sandbox Apple ID.
- Add Mastercard sandbox test cards.
- Send an authorization to
https://apitest.cybersource.comusing:processingInformation.paymentSolution = "001"paymentInformation.tokenizedCard.transactionType = "1"
- Confirm an AUTHORIZED reply.
- Test negative/error scenarios.
6. Go Live
- Create the production certificate for the production Merchant ID.
- Switch API credentials to production.
- Verify production web domains.
- Send a low-value or $0 authorization.
7. Troubleshooting & Wallet Authorization Failures
Most errors relate to cryptogram mapping, domain validation, or acquirer-specific routing.
7.1 Cryptogram / DSRP Mapping Issues
- Cryptogram must be forwarded unaltered.
- Incorrect ECI values lead to declines.
- Merchant-managed decryption may be unsupported.
Expected ECI values:
- 05 = Wallet device-present
- 07 = Wallet device-not-present
Resolution:
- Forward cryptogram exactly as provided.
- Ensure
transactionType = "1". - Confirm acquirer supports MDES tokenization.
7.2 Domain Validation Issues (Web)
Symptoms:
- Apple Pay button does not appear
- Token is never generated
- "invalid merchant domain"
Resolution:
- Host the verification file at the exact path required.
- Purge all CDN caches.
- Ensure valid HTTPS with no certificate warnings.
- Match the domain exactly as registered in Apple Developer.
7.3 Acquirer-Specific Behaviors
- Some acquirers require specific ECI/cryptogram combinations.
- Some do not support merchant-managed decryption.
- Some route Apple Pay differently than PAN e-commerce transactions.
Resolution:
- Verify MDES tokenization support.
- Provide acquirer full transaction details (ECI, cryptogram, token reference ID).
- Switch to Cybersource-managed decryption if unsupported.
7.4 Expected Behaviors (Not Errors)
- AVS/CVV may be unavailable for digital wallet transactions.
- Test tokens behave differently than production tokens.
- Apple Pay may show wallet identifiers instead of card brand.
- Mastercard cryptograms lack some fields present in PAN transactions.
7.5 Quick Diagnostic Flow
- Apple Pay button missing → domain validation
- Token fields missing → integration issue
- Cryptogram/ECI errors → mapping issue
- Decline from acquirer → acquirer nuance
- Certificate mismatch → regenerate CSR
- Ensure:
paymentSolution = "001"transactionType = "1"
| Reply Code | Message | Cause | Resolution |
|---|---|---|---|
| 101 | Missing fluidData | Token not sent | Populate fluidData.value |
| 101 | Missing transactionType | Missing flag | Set "1" |
| 102 | Invalid paymentSolution | Wrong or blank value | Set "001" |
| 152 | Tokenization not supported | Processor not MDES-enabled | Confirm certification |
| 233 | Cryptogram error | Missing/invalid ECI or cryptogram | Forward values unaltered |
8. Escalation Criteria
Escalate only when:
- Domain verification succeeds but token generation fails
- CSR generation fails repeatedly
- Acquirer returns unsupported errors despite MDES certification
- Cryptogram validation fails even when values are unaltered
- Merchant-managed decryption fails with correct key material
9. References
Was this article helpful?
