From what I understand the MikroTik implemention intercepts HTTP requests (and optionally HTTPS) and redirects them internally to the hotspot setup running on the router. But it's not very graceful and especially with HTTPS it either doesn't work or it will throw a certificate warning, and it doesn't always work anyway with some users devices not being notified in any way that they need to login. I've seen much better hotspot implementations out there that do actually work with HTTPS. I've been reading up on it and essentially its up to the browser but there are common methods, most will try a well-known DNS name or access a specific site to look for redirect requests and if it doesn't respond exactly as expected then gracefully show the user that they need to login, rather than simply alerting them
that their information is about to be stolen...
https://success.tanaza.com/s/article/Ho ... rtal-works
https://thinkincredible.intraway.com/bl ... ve-portals
Is there a way to improve the MikroTik system? i.e. firewall rules, static DNS entries etc to comply with the way these browsers operate