Tutorial: Logging onto a Secure SQL Server Database Using Integrated Security: Conclusion
You have successfully set your code to change the database location at runtime. In this example, it is the same database server, the only difference is that you have called it explicitly by name.
However, you can now change this database server name string to any other database server that contains the Northwind database.
Note
You may wish to work further with this tutorial by adding a subreport into your report and configuring that subreport to logon to the secure SQL Server database. If so, proceed to the tutorial which modifies your current tutorial: Tutorial: Logging onto a Secure SQL Server Database with a Subreport.