Add MultiMail to ServiceNow AI Gateway in One Click

MultiMail is published in the official MCP registry. Browse it inside AI Control Tower, click Approve, and your Copilot Studio / Bedrock / Vertex AI agents get governed email.


ServiceNow's AI Gateway shipped its Q1 2026 release with native MCP community registry import inside AI Control Tower. Selecting an MCP server auto-populates URL, auth type, and the exposed tool list — eliminating manual intake. The same release added CIMD (Client Identity Metadata Documents) for automated client registration, so connecting a fleet of Copilot Studio agents to ten approved servers no longer means ten separate registrations.

MultiMail is published in that registry as dev.multimail/mcp-server, authenticated via DNS Ed25519 keys. AI stewards browsing AI Control Tower can find MultiMail, see its 41 tools and OAuth 2.1 setup, and approve it through ServiceNow's normal governance flow. The mailbox-level oversight model (read_only, gated_all, gated_send, monitored, autonomous) layers naturally on top of AI Gateway's server-level lifecycle (In Review → Approved → Active → Deprecated).

Behind the same control plane: AI Gateway's P50/P90/P95 latency observability surfaces MultiMail performance directly in AI Control Tower, and the global pause-and-resume kill switch covers MultiMail traffic alongside every other registered server.

Built for AI Control Tower

Native Registry Import

Published as dev.multimail/mcp-server with DNS Ed25519 auth. AI Gateway auto-populates URL, auth type, and the full 41-tool list when you select MultiMail in AI Control Tower — no manual JSON intake.

Oversight Maps to Lifecycle

AI Gateway's In Review → Approved → Active → Deprecated server lifecycle pairs with MultiMail's mailbox-level oversight modes. Promote both in lockstep as agent trust builds.

CIMD-Ready

Client Identity Metadata Documents let a fleet of agents under Copilot Studio, Bedrock, or Vertex AI connect to MultiMail through one approved registration — no per-agent setup.

Latency in AI Control Tower

AI Gateway's P50/P90/P95 latency dashboard surfaces MultiMail performance alongside every other registered server. No separate monitoring stack to wire up.


From registry to active in three steps

MultiMail's MCP registry entry (auto-imported by AI Gateway)
json
{
  "name": "dev.multimail/mcp-server",
  "description": "Email infrastructure for AI agents with graduated oversight, "
                 "verifiable identity, signed disclosure headers, and 41 MCP tools.",
  "version": "0.5.5",
  "repository": { "url": "https://github.com/multimail-dev/mcp-server" },
  "remotes": [{
    "type": "sse",
    "url": "https://mcp.multimail.dev/mcp",
    "auth": { "type": "oauth2.1" }
  }]
}

Selecting MultiMail in AI Control Tower's MCP browser pulls this entry. AI Gateway populates URL, auth type, and the 41 exposed tool definitions with one click.

Register an AI Gateway client against MultiMail (CIMD)
bash
"cm"># AI Gateway issues a CIMD for the calling agent;
"cm""># MultiMail validates the document and binds the agent identity
curl -X POST https://mcp.multimail.dev/oauth/register \
  -H "content-type: application/json" \
  -d '{
    "cimd": "eyJ...",
    "client_name": "servicenow-ai-gateway-prod",
    "redirect_uris": ["https://your-instance.service-now.com/oauth/callback"]
  }'

Register once at the AI Gateway level. Every agent under Copilot Studio, Bedrock, or Vertex AI inherits the registration via CIMD — no per-agent setup.

Now Assist agent script using a MultiMail tool
javascript
"cm"># Now Assist tool definition referencing the AI Gateway-approved MultiMail server
const incidentEscalationAgent = {
  name: "incident-escalation",
  instructions: "When an incident reaches Sev 1, send escalation email via MultiMail. "
              + "The mailbox runs in gated_send mode — emails queue for CISO approval.",
  tools: ["multimail.send", "multimail.list_mailboxes", "multimail.get_audit_log"]
};

"cm"># AI Control Tower routes the tool call through the registered MCP server
"cm""># and records latency metrics for the dashboard
const result = await aiGateway.invokeAgent(incidentEscalationAgent, {
  context: { incident_id: "INC0012345", severity: 1 }
});

Now Assist agents reference MultiMail tools by name; AI Gateway handles routing, auth, and observability.


Step by step

1

Open AI Control Tower → MCP Servers

Navigate to AI Gateway → AI Control Tower → MCP Servers in your ServiceNow instance. Select “Browse Registry” to open the community registry view.

2

Select MultiMail and approve

Find dev.multimail/mcp-server. AI Gateway auto-populates URL, OAuth 2.1 setup, and the full 41-tool list. Move the server through the In Review → Approved → Active lifecycle per your governance policy.

4

Connect agents via CIMD

AI Gateway issues a CIMD for each registered agent client. The first time an agent calls MultiMail, the CIMD is presented and validated — no manual per-agent registration.

4

Configure mailbox oversight

In MultiMail, set new mailboxes to gated_send so every outbound email queues for human approval. Promote to monitored or autonomous as the agent demonstrates correct behavior.

5

Watch latency in AI Control Tower

AI Gateway's P50/P90/P95 dashboard surfaces MultiMail performance alongside every other registered server. Use the global pause toggle for incident response.


Common questions

Is MultiMail in the MCP community registry?
Yes. MultiMail is published as dev.multimail/mcp-server in the official MCP registry at registry.modelcontextprotocol.io with DNS-based authentication via Ed25519 keys. ServiceNow AI Gateway's Q1 2026 release added native registry import, so AI stewards can browse to MultiMail in AI Control Tower, select it, and the URL, OAuth 2.1 auth, and full tool list auto-populate.
How does MultiMail's oversight model fit AI Gateway's lifecycle?
AI Gateway tracks each MCP server through a lifecycle: In Review, Approved, Active, Deprecated. MultiMail's five oversight modes complement that flow at the per-mailbox level. A mailbox can start in read_only while AI stewards inspect inbound traffic, then graduate to gated_send (every outbound queues for approval), then monitored, then autonomous — mirroring AI Gateway's own promotion path for the server itself.
Does MultiMail support CIMD automated client registration?
Yes. AI Gateway's Q1 2026 release added Client Identity Metadata Documents (CIMD) so that connecting agents from Copilot Studio, Bedrock, or Vertex AI to multiple approved MCP servers no longer requires N separate registrations. MultiMail accepts CIMD-presented client identities, so a fleet of agents under your AI Gateway connects to MultiMail through one approved registration.
Does AI Gateway's pause-and-resume kill switch cover MultiMail?
Yes — that's the value of having MultiMail behind AI Gateway. Toggle the global pause in AI Control Tower and all agent traffic to MultiMail (and every other MCP server) cuts immediately, with configuration preserved for resume. For email-side cutover specifically, you can also flip individual MultiMail mailboxes to read_only or gated_all, which is finer-grained than a global pause.

Explore more

The only agent email with a verifiable sender

Email infrastructure built for AI agents. Verifiable identity, graduated oversight, and a 38-tool MCP server. Formally verified in Lean 4.