The process of obtaining the authorization token requires several steps
of decoding, encoding, decrypting, and encrypting data. At the end you
have a JWE (JSON Web Encryption) object you submit to Cybersource and
they return the token we will use lat...