Using SSL/TLS and configuring LDAPS with Presto on Amazon EMR
With Amazon EMR release version 5.6.0 and later, you can enable SSL/TLS to help secure
                internal communication
When you use a security configuration with in-transit encryption, Amazon EMR does the following for Presto:
- 
                Distributes the encryption artifacts, or certificates, that you specify for in-transit encryption throughout the Presto cluster. For more information, see Providing certificates for in-transit data encryption. 
- 
                Sets the following properties using the presto-configconfiguration classification, which corresponds to theconfig.propertiesfile for Presto:- 
                        Sets http-server.http.enabledtofalseon all nodes, which disables HTTP in favor of HTTPS. This requires you to provide certificates that work for public and private DNS when setting up the security configuration for in-transit encryption. One way to do this is to use SAN (Subject Alternative Name) certificates which support multiple domains.
- 
                        Sets http-server.https.*values. For configuration details, see LDAP authenticationin Presto documentation. 
 
- 
                        
In addition, with Amazon EMR release version 5.10.0 and later, you can set up LDAP
                authentication
Presto on Amazon EMR uses port 8446 for internal HTTPS by default. The port used for
            internal communication must be the same port used for client HTTPS access to the Presto
            coordinator. The http-server.https.port property in the
                presto-config configuration classification specifies the port.