This technique can also be used for other data sources e.g. files, web services.
Note that when you do change these settings, you may have to specify Authentication/Credential details for the new source.