The whole manual from hide.me is weird. It does not suggest loading of the two CA certificates, however you managed to do that, good. I have imported all three certificates to 6.47.10 and to 6.48.6; neither version shows the A(uthority) flag for the two DigiCert CA certificates, but I’ve found that I was using some other certificates relying on a chain of CA certificates that also did not show the A(uthority) flag and nevertheless it worked. The DigiCert certificates themselves seem fine to me, and the link between them and the hide.me certificate seems fine as well (the …SHA256… one is signed by the …global root CA… one, and the hide.me one is signded by the …SHA256… one).
The next thing to come to my mind was wrong time on your router, but the first row of the log shows it is not an issue either.
So another question was whether hide.me actually presents the certificate they provide in the manual. So I’ve connected to the hide.me server shown in the guide, and got the “ipsec,error unable to get local issuer certificate(20) at depth:0 cert:CN=*.hide.me,C=MY,ST=,L=Labuan,O=eVenture Limited,OU=,SN=” ; once I’ve installed the …SHA256… one from DigiCert, the error has changed to “ipsec,error unable to get issuer certificate(2) at depth:1 cert:CN=DigiCert TLS RSA SHA256 2020 CA1,C=US,ST=,L=,O=DigiCert Inc,OU=,SN=”, and once I have installed the …global root CA… one, there were no more errors regarding certificate authentication. Of course the EAP authentication could not pass because I don’t have any real username and password for hide.me, but that was not the goal of the test.
Note that I did not install the hide.me own certificate, as it is only used to make sure that you do not connect, by mistake or due to DNS hijacking, to some other responder (server) whose identity is certified by the same chain of CA certificates like the hide.me servers. So when a certificate presented by the responder is validated using the chain of CA certificates installed on the Mikrotik, it is compared to the one the /ip ipsec identity row refers to (or maybe it is first compared and then validated using the CA certificates, it doesn’t actually matter).
So the key question is where did you obtain the two CA certificates? I’ve downloaded them from https://www.digicert.com/kb/digicert-root-certificates.htm and imported them to the Mikrotik.