Virtually anyone has encountered some problems with opening unknown files while working on a computer. It can be very frustrating. Yet such problems, not only with REQ files, can be addressed in a standard way. Follow the steps below and we can guarantee that your problem with opening REQ will be resolved!
A REQ (SSL Certificate Request Format) is the file generated by a web server that contains information about the certificate requester, the public key, and other details of the request. To obtain an SSL certificate, this file must be submitted to a certification authority. It is an encoded text file with a “.req” extension.
A REQ file created using the openssl utility contains information such as the country, organization name, details of the server, and a challenge password. It is usually encrypted with the company's private key and encoded in either Base-64 or DER encoding formats.
If given user account does not have necessary permissions to open files with REQ extension, it is highly probable that no program that supports given files is installed on the users’ system. Below is a list of actions user should pursue in order to resolve most common problems.
After the application has been installed, the system should automatically open REQ files with given application. Below is the list of relevant programs along with operating systems they are available for:
It is possible that an application that supports REQ files is not associated with such files. In such case, the program should by manually associated with REQ files (right-click on the file icon → Properties → General Tab → In submenu "Open with" and click on "Change" button. System will display a list of suggested programs that support REQ files. Choose the application by checking the box "Always use the selected application to open this kind of files". System will store this information in its registry and use it to open REQ files with the selected program.
File association for REQ files can be edited manually by editing appropriate entry in Windows System Registry. However, it is discouraged as it may introduce errors to registry if not done properly and may even damage the system.